Packet Threat Analysis

Everyone needs to do some housekeeping at different points, and I figured it was time I did some a basic security sweep of my setup. To get started, I performed a quick packet capture on the very server that hosts this blog. I decided to give one of CloudShark's newer and more distinct features a spin with my recently created account; their Threat Assessment tool. I thought it would be interesting to pit this against PacketTotal as well. These are both great tools with similar, but also different purposes. At the time, I had SSH and web ports open along with a few other unused ports for various common services. The only true security measure in place was a few basic iptables rules.   CloudShark What I Liked: Up front, quick severity level rating dashboard Brief descriptions of issues which helps puts everything in laymen's terms World map view Privacy settings ...
Read More

Cisco Meraki Security Appliance

Note: I apologize for the loss of the screen shots. When I transferred my blog host the images were lost and I did not yet have a backup copy. Being that I actually enjoy networking and it's not just a job, I like to explore new and different technologies. I also like to continue to learn and branch into areas where I'm not as comfortable. One of these areas being firewalls. In my personal life, I have typically used my home routers with their built-in firewall capabilities (though I have my eye on Sophos). Professionally, I have had very limited experience with Cisco ASAs and Bluecoat devices. However, I recently became aware of a free trial program provided by Cisco Meraki (more info here). I found that I fulfilled the requirements and decided that a little learning couldn't hurt, so I signed up for the webinar. A short time later the trial appliance arrived. Before I let my coworkers in on...
Read More